SlideShare a Scribd company logo
 6LoWPAN is an IPv6 protocol, and It’s
extended from is IPv6 over Low Power
Personal Area Network. As the name itself
explains the meaning of this protocol is that
this protocol works on Wireless Personal
Area Network i.e., WPAN.
 WPAN is a Personal Area Network (PAN)
where the interconnected devices are
centered around a person’s workspace and
connected through a wireless medium.
 6LoWPAN allows communication using the
IPv6 protocol. IPv6 is Internet Protocol
Version 6 is a network layer protocol that
allows communication to take place over the
network. It is faster and more reliable and
provides a large number of addresses.
 6LoWPAN initially came into existence to
overcome the conventional methodologies
that were adapted to transmit information.
 But still, it is not so efficient as it only allows
for the smaller devices with very limited
processing ability to establish
communication using one of the Internet
Protocols, i.e., IPv6.
 It has very low cost, short-range, low
memory usage, and low bit rate.
 It comprises an Edge Router and Sensor
Nodes. Even the smallest of the IoT devices
can now be part of the network, and the
information can be transmitted to the outside
world as well.
 For example, LED Streetlights.
 It is a technology that makes the individual
nodes IP enabled.
 6LoWPAN can interact with 802.15.4
devices and also other types of devices on
an IP Network. For example, Wi-Fi.
 It uses AES(Advanced Encryption
Standard)128 link layer security, which AES
is a block cipher having key size of
128/192/256 bits and encrypts data in blocks
of 128 bits each. This is defined in IEEE
802.15.4 and provides link authentication
and encryption.
 The device should be having sleep mode in
order to support the battery saving.
 Minimal memory requirement.
 Routing overhead should be lowered.
 It is used with IEEE 802.15,.4 in the 2.4 GHz
band.
 Outdoor range: ~200 m (maximum)
 Data rate: 200kbps (maximum)
 Maximum number of nodes: ~100
 6LoWPAN is a mesh network that is robust,
scalable, and can heal on its own.
 It delivers low-cost and secure communication
in IoT devices.
 It uses IPv6 protocol and so it can be directly
routed to cloud platforms.
 It offers one-to-many and many-to-one routing.
 In the network, leaf nodes can be in sleep mode
for a longer duration of time.
 It is comparatively less secure than Zigbee.
 It has lesser immunity to interference than
that Wi-Fi and Bluetooth.
 Without the mesh topology, it supports a
short range.
 It is a wireless sensor network.
 It is used in home-automation,
 It is used in smart agricultural techniques,
and industrial monitoring.
 Security: 6LoWPAN security is ensured by
the AES algorithm, which is a link layer
security, and the transport layer security
mechanisms are included as well.
 Interoperability: 6LoWPAN is able to
operate with other wireless devices as well
which makes it interoperable in a network.

More Related Content

Similar to iot(ai) unit3.pptx

Mphasis Digital POV - Emerging Open Standard Protocol stack for IoT
Mphasis Digital POV - Emerging Open Standard Protocol stack for IoTMphasis Digital POV - Emerging Open Standard Protocol stack for IoT
Mphasis Digital POV - Emerging Open Standard Protocol stack for IoT
Aniruddha Chakrabarti
 
Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002
suvobgd
 

Similar to iot(ai) unit3.pptx (20)

Efficient End-to-End Secure Key Management Protocol for Internet of Things
Efficient End-to-End Secure Key Management Protocol for Internet of Things Efficient End-to-End Secure Key Management Protocol for Internet of Things
Efficient End-to-End Secure Key Management Protocol for Internet of Things
 
794326
794326794326
794326
 
Io t hurdles_i_pv6_slides_doin
Io t hurdles_i_pv6_slides_doinIo t hurdles_i_pv6_slides_doin
Io t hurdles_i_pv6_slides_doin
 
6 lowpan
6 lowpan6 lowpan
6 lowpan
 
Adhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devicesAdhoc mobile wireless network enhancement based on cisco devices
Adhoc mobile wireless network enhancement based on cisco devices
 
Future protocol IP v6
Future protocol IP v6Future protocol IP v6
Future protocol IP v6
 
WI-FI and Wi Max
WI-FI and Wi MaxWI-FI and Wi Max
WI-FI and Wi Max
 
IoT Connectivity
IoT Connectivity IoT Connectivity
IoT Connectivity
 
Important topics.pptx
Important topics.pptxImportant topics.pptx
Important topics.pptx
 
IPv6 ND 2020
IPv6 ND 2020IPv6 ND 2020
IPv6 ND 2020
 
communication_technologies_Internet of things topic
communication_technologies_Internet of things topiccommunication_technologies_Internet of things topic
communication_technologies_Internet of things topic
 
Mphasis Digital POV - Emerging Open Standard Protocol stack for IoT
Mphasis Digital POV - Emerging Open Standard Protocol stack for IoTMphasis Digital POV - Emerging Open Standard Protocol stack for IoT
Mphasis Digital POV - Emerging Open Standard Protocol stack for IoT
 
Implementation_and_Analysis_of_the_6LoWPAN.pdf
Implementation_and_Analysis_of_the_6LoWPAN.pdfImplementation_and_Analysis_of_the_6LoWPAN.pdf
Implementation_and_Analysis_of_the_6LoWPAN.pdf
 
Ipv4 Vs Ipv6
Ipv4 Vs Ipv6Ipv4 Vs Ipv6
Ipv4 Vs Ipv6
 
IoT Communication Protocols.pdf
IoT Communication Protocols.pdfIoT Communication Protocols.pdf
IoT Communication Protocols.pdf
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002Internet Protocol Version 6 By Suvo 2002
Internet Protocol Version 6 By Suvo 2002
 
2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt2.Introduction to Network Devices.ppt
2.Introduction to Network Devices.ppt
 
How To Disrupt The Internet of Things With Unified Networking
How To Disrupt The Internet of Things With Unified NetworkingHow To Disrupt The Internet of Things With Unified Networking
How To Disrupt The Internet of Things With Unified Networking
 
IOT Protocols
IOT  Protocols IOT  Protocols
IOT Protocols
 

Recently uploaded

Fruit shop management system project report.pdf
Fruit shop management system project report.pdfFruit shop management system project report.pdf
Fruit shop management system project report.pdf
Kamal Acharya
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Online blood donation management system project.pdf
Online blood donation management system project.pdfOnline blood donation management system project.pdf
Online blood donation management system project.pdf
Kamal Acharya
 
Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdf
AbrahamGadissa
 

Recently uploaded (20)

Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
Immunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary AttacksImmunizing Image Classifiers Against Localized Adversary Attacks
Immunizing Image Classifiers Against Localized Adversary Attacks
 
Fruit shop management system project report.pdf
Fruit shop management system project report.pdfFruit shop management system project report.pdf
Fruit shop management system project report.pdf
 
Peek implant persentation - Copy (1).pdf
Peek implant persentation - Copy (1).pdfPeek implant persentation - Copy (1).pdf
Peek implant persentation - Copy (1).pdf
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
ENERGY STORAGE DEVICES INTRODUCTION UNIT-I
ENERGY STORAGE DEVICES  INTRODUCTION UNIT-IENERGY STORAGE DEVICES  INTRODUCTION UNIT-I
ENERGY STORAGE DEVICES INTRODUCTION UNIT-I
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
fundamentals of drawing and isometric and orthographic projection
fundamentals of drawing and isometric and orthographic projectionfundamentals of drawing and isometric and orthographic projection
fundamentals of drawing and isometric and orthographic projection
 
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
 
Construction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptxConstruction method of steel structure space frame .pptx
Construction method of steel structure space frame .pptx
 
IT-601 Lecture Notes-UNIT-2.pdf Data Analysis
IT-601 Lecture Notes-UNIT-2.pdf Data AnalysisIT-601 Lecture Notes-UNIT-2.pdf Data Analysis
IT-601 Lecture Notes-UNIT-2.pdf Data Analysis
 
Pharmacy management system project report..pdf
Pharmacy management system project report..pdfPharmacy management system project report..pdf
Pharmacy management system project report..pdf
 
Scaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltageScaling in conventional MOSFET for constant electric field and constant voltage
Scaling in conventional MOSFET for constant electric field and constant voltage
 
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
NO1 Pandit Amil Baba In Bahawalpur, Sargodha, Sialkot, Sheikhupura, Rahim Yar...
 
fluid mechanics gate notes . gate all pyqs answer
fluid mechanics gate notes . gate all pyqs answerfluid mechanics gate notes . gate all pyqs answer
fluid mechanics gate notes . gate all pyqs answer
 
Arduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectArduino based vehicle speed tracker project
Arduino based vehicle speed tracker project
 
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and VisualizationKIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
KIT-601 Lecture Notes-UNIT-5.pdf Frame Works and Visualization
 
Online blood donation management system project.pdf
Online blood donation management system project.pdfOnline blood donation management system project.pdf
Online blood donation management system project.pdf
 
Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 

iot(ai) unit3.pptx

  • 1.  6LoWPAN is an IPv6 protocol, and It’s extended from is IPv6 over Low Power Personal Area Network. As the name itself explains the meaning of this protocol is that this protocol works on Wireless Personal Area Network i.e., WPAN.
  • 2.
  • 3.  WPAN is a Personal Area Network (PAN) where the interconnected devices are centered around a person’s workspace and connected through a wireless medium.
  • 4.  6LoWPAN allows communication using the IPv6 protocol. IPv6 is Internet Protocol Version 6 is a network layer protocol that allows communication to take place over the network. It is faster and more reliable and provides a large number of addresses.
  • 5.
  • 6.  6LoWPAN initially came into existence to overcome the conventional methodologies that were adapted to transmit information.  But still, it is not so efficient as it only allows for the smaller devices with very limited processing ability to establish communication using one of the Internet Protocols, i.e., IPv6.  It has very low cost, short-range, low memory usage, and low bit rate.
  • 7.  It comprises an Edge Router and Sensor Nodes. Even the smallest of the IoT devices can now be part of the network, and the information can be transmitted to the outside world as well.  For example, LED Streetlights.
  • 8.
  • 9.
  • 10.  It is a technology that makes the individual nodes IP enabled.  6LoWPAN can interact with 802.15.4 devices and also other types of devices on an IP Network. For example, Wi-Fi.  It uses AES(Advanced Encryption Standard)128 link layer security, which AES is a block cipher having key size of 128/192/256 bits and encrypts data in blocks of 128 bits each. This is defined in IEEE 802.15.4 and provides link authentication and encryption.
  • 11.
  • 12.  The device should be having sleep mode in order to support the battery saving.  Minimal memory requirement.  Routing overhead should be lowered.
  • 13.  It is used with IEEE 802.15,.4 in the 2.4 GHz band.  Outdoor range: ~200 m (maximum)  Data rate: 200kbps (maximum)  Maximum number of nodes: ~100
  • 14.  6LoWPAN is a mesh network that is robust, scalable, and can heal on its own.  It delivers low-cost and secure communication in IoT devices.  It uses IPv6 protocol and so it can be directly routed to cloud platforms.  It offers one-to-many and many-to-one routing.  In the network, leaf nodes can be in sleep mode for a longer duration of time.
  • 15.  It is comparatively less secure than Zigbee.  It has lesser immunity to interference than that Wi-Fi and Bluetooth.  Without the mesh topology, it supports a short range.
  • 16.  It is a wireless sensor network.  It is used in home-automation,  It is used in smart agricultural techniques, and industrial monitoring.
  • 17.  Security: 6LoWPAN security is ensured by the AES algorithm, which is a link layer security, and the transport layer security mechanisms are included as well.  Interoperability: 6LoWPAN is able to operate with other wireless devices as well which makes it interoperable in a network.